IBM. DFSMSdfp Storage Administration. z/os. Version 2 Release 3 SC

Similar documents
IBM. DFSMS Using the Interactive Storage Management Facility. z/os. Version 2 Release 3 SC

IBM. DFSMS Implementing System-Managed Storage. z/os. Version 2 Release 3 SC

DFSMSdfp Storage Administration Reference

IBM. DFSMS Introduction. z/os. Version 2 Release 3 SC

IBM. DFSMS Managing Catalogs. z/os. Version 2 Release 3 SC

IBM. DFSMStvs Planning and Operating Guide. z/os. Version 2 Release 3 SC

DFSMS Basics: How to Create/Modify an SMS Configuration and Write ACS Routines - Demo

IBM. DFSMS Object Access Method Application Programmer s Reference. z/os. Version 2 Release 3 SC

Db2 Query Management Facility Version 12 Release 2. Installing and Managing Db2 QMF for TSO and CICS IBM GC

IBM. DFSMS Using the New Functions. z/os. Version 2 Release 3 SC

Testing and Debugging Your Installation s ACS Routines

DFSMSdss Best Practices in an SMS Environment

IBM. MVS Interactive Problem Control System (IPCS) User's Guide. z/os. Version 2 Release 3 SA

IBM. AFP Download Plus. Print Services Facility for z/os. Version 4, Release 6.0 S

IBM. DFSMShsm Implementation and Customization Guide. z/os. Version 2 Release 3 SC

IBM. Using the Installation Dialog. ServerPac. Dialog Level: 28 SA

IBM. Using the Installation Dialog. ServerPac. Dialog Level: 28 SA

DFSMS:Intermediate NaviQuest Streamlining SMS Work

Installing and Administering a Satellite Environment

IBM. MVS Planning: Workload Management. z/os. Version 2 Release 3 SC

z/os Introduction and Workshop Data Sets

IBM. TSO/E User's Guide. z/os. Version 2 Release 3 SA

IBM. Hardware Configuration Definition Planning. z/os. Version 2 Release 3 GA

IBM. TSO/E System Programming Command Reference. z/os. Version 2 Release 3 SA

z/os Version 2 Release 3 TSO/E User's Guide IBM SA

SMS Volume Selection. z/series Expo Session Z30 September, 2005 Ruth Ferziger

IBM Tivoli Decision Support for z/os Version Administration Guide and Reference IBM SH

IBM. Candle OMEGAMON Platform. Configuring IBM Tivoli Candle Management Server on z/os. Tivoli. Version 360 GC

DFSMS Object Support: Data Archiving with OAM

"Charting the Course... z/os Technical Bootcamp Course Summary

IBM Virtualization Engine TS7700 Series Copy Export Function User's Guide Version 2.1.5

NaviQuest Testing ACS Hands-On Lab

IBM. IBM Tivoli Directory Server Plug-in Reference for z/os. z/os. Version 2 Release 3 SA

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM

The Life and Times of a Data Set: You Wouldn't Want Your Relatives Hanging Around, Why Your Data?

IBM. Hardware Configuration Definition Messages. z/os and z/vm. Version 2 Release 3 SC

z/os Version 2 Release 3 Hardware Configuration Definition Planning IBM GA

ISPF Users Boot Camp - Part 2 of 2

IBM. DFSMS Installation Exits. z/os. Version 2 Release 3 SC

IBM Tivoli OMEGAMON XE for Storage on z/os Version Tuning Guide SC

Version Monitoring Agent User s Guide SC

IBM. MVS Programming: Writing Servers for APPC/MVS. z/os. Version 2 Release 3 SA

Mainstar : Backup & Recovery Manager Suite

IBM Tools Base for z/os Version 1 Release 6. IMS Tools Knowledge Base User's Guide and Reference IBM SC

IBM. Download for z/os. Print Services Facility for z/os. Version 4, Release 6.0 S

IBM. Documentation. IBM Sterling Connect:Direct Process Language. Version 5.3

IBM. Enterprise Systems Architecture/ Extended Configuration Principles of Operation. z/vm. Version 6 Release 4 SC

IBM. JES2 Delivery Services. z/os. Version 2 Release 3

NaviQuest Testing ACS and Streamlining SMS Tasks

IBM. MVS Planning: Operations. z/os. Version 2 Release 3 SA

IBM Tivoli Storage FlashCopy Manager Version Installation and User's Guide for Windows IBM

What s New in z/os DFSMS tm Overview

IBM Tivoli Storage Manager HSM for Windows Version 7.1. Administration Guide

Version 1 Release 2. IBM IMS Cloning Tool User's Guide IBM SC

IBM Tivoli Advanced Reporting for DFSMShsm. User s Guide. Version 2 Release 2 SC

CA Software Change Manager for Mainframe

Db2 12 for z/os. Data Sharing: Planning and Administration IBM SC

IBM. MVS Interactive Problem Control System (IPCS) Customization. z/os. Version 2 Release 3 SA

The SMF recovery analysis report (SRSSMF) formats SMF records produced by SRS and provides totals for the successful and unsuccessful recoveries

IBM Spectrum Protect Snapshot Version Installation and User's Guide for Windows IBM

IBM. z/os Information Roadmap. z/os. Version 2 Release 3 SA

Information Catalog Center Administration Guide

With Tivoli Advanced Catalog

IBM. MVS Programming: Extended Addressability Guide. z/os. Version 2 Release 3 SA

Version 4 Release 5. IBM DB2 Table Editor for z/os User's Guide IBM SC

Course Outline. ProTech Professional Technical Services, Inc. Veritas Backup Exec 20.1: Administration. Course Summary.

What s New in z/os DFSMS tm. Overview. Barbara McDonald IBM DFSMS Product Management August 2, 2010 Session 8051

IBM. Planning for Multilevel Security and the Common Criteria. z/os. Version 2 Release 3 GA

An Introduction to z/os DASD Backup and Archiving

IBM Tivoli Advanced Reporting for DFSMShsm. User s Guide. Version 1 Release 1 SC

for Mainstar MXI G2 Session 8962 Speaker: Shari Killion

CA File Master Plus. ISPF User Guide. Release

IBM. Container Pricing for IBM Z. z/os. Version 2 Release 3

IBM Spectrum Protect Snapshot Version Installation and User's Guide for Windows IBM

IBM IMS Database Solution Pack for z/os Version 2 Release 1. Overview and Customization IBM SC

Tivoli Decision Support for z/os. Administration. Version 1.7 SH

Achieving Higher Levels of Productivity with IBM ISPF Productivity Tool for z/os IBM Redbooks Solution Guide

IBM. JES2 Introduction. z/os. Version 2 Release 3 SA

IBM InfoSphere Classic Federation for z/os Version 11 Release 1. Installation Guide GC

Version 9 Release 1. IBM InfoSphere Guardium S-TAP for IMS on z/os V9.1 User's Guide IBM

Information/Management

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM. TSO/E REXX User's Guide. z/os. Version 2 Release 3 SA

IBM Tivoli Storage Manager for Databases Version Data Protection for Microsoft SQL Server Installation and User's Guide IBM

IBM Spectrum Protect for Databases Version Data Protection for Microsoft SQL Server Installation and User's Guide IBM

International Technical Support Organization. IBM System Storage Tape Encryption Solutions. May 2009 SG

z/vm Connectivity Version 5 Release 1 SC

Administrator s Guide. StorageX 8.0

DFSMShsm: Managing PDSE V2 Data Sets

IBM. IBM Multi-Factor Authentication for z/os User's Guide. z/os. Version 1 Release 3 SC

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

IBM. Distributed File Service SMB Administration. z/os. Version 2 Release 3 SC

Version 1 Release 6. IBM Autonomics Director for Db2 for z/os User's Guide IBM SC

IBM. Container Pricing for IBM Z. z/os. Version 2 Release 3

IBM System z Fast Track

IBM. DFSORT Tuning Guide. z/os. Version 2 Release 3 SC

IBM. Planning for Sub-Capacity Pricing. z/os. Version 2 Release 3 SA

CICSPlex SM Managing Resource Usage

Security Service tools user IDs and passwords

Tivoli Decision Support for OS/390 Administration Guide. Version SH

Transcription:

z/os IBM DFSMSdfp Storage Administration Version 2 Release 3 SC23-6860-30

Note Before using this information and the product it supports, read the information in Notices on page 423. This edition applies to Version 2 Release 3 of z/os (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: July 17, 2017 Copyright IBM Corporation 1984, 2017. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Contents Figures............... ix Tables............... xi About this document........ xiii Required product knowledge........ xiii Notational conventions.......... xiii z/os information.......... xv How to send your comments to IBM xvii If you have a technical problem....... xvii Summary of changes........ xix Summary of changes for z/os Version 2 Release 3 (V2R3)................ xix Summary of changes for z/os Version 2 Release 2 (V2R2)................ xx Summary of changes for z/os Version 2 Release 1 (V2R1) as updated March, 2014........ xx z/os Version 2 Release 1 summary of changes.. xx Chapter 1. Introducing the Storage Management Subsystem....... 1 Understanding the Storage Management Subsystem 1 Using the Interactive Storage Management Facility. 1 Customizing ISMF........... 3 Defining your storage management policy.... 3 Preparing for and implementing the Storage Management Subsystem.......... 5 Running SMS in a parallel sysplex environment.. 5 Basic terms and definitions........ 6 System grouping............ 6 Running SMS on mixed DFSMS releases..... 8 Chapter 2. Preparing for the Storage Management Subsystem....... 9 Allocating control data sets......... 9 Source control data set (SCDS)....... 10 Active control data set (ACDS)....... 10 Communications data set (COMMDS).... 11 Calculating the size of storage and active control data sets.............. 11 Calculating the size of a COMMDS..... 12 Selecting volumes for control data sets.... 12 Allocating an SCDS........... 13 Allocating an ACDS.......... 13 Allocating a COMMDS......... 14 Recommendations........... 14 Defining SMS as trusted to RACF....... 14 Modifying the SYS1.PARMLIB data set..... 15 Initializing SMS through the IGDSMSxx member 15 Starting the SMS address space....... 15 Accessing the storage administrator primary option menu................ 16 Planning for VSAM record-level sharing..... 16 Chapter 3. Creating the base configuration............ 19 Planning the base configuration....... 19 Defining the base configuration........ 19 Validating the SCDS.......... 21 Activating the SCDS.......... 21 Specifying the default management class... 21 Specifying the default unit........ 21 Specifying the default device geometry.... 21 Specifying the DS separation profile..... 22 Specifying systems and system groups in the SMS complex............. 22 Defining the base configuration for VSAM record-level sharing........... 24 Using cache structures.......... 24 Defining cache sets........... 24 Defining lock sets........... 25 Completing the base configuration...... 25 Chapter 4. Defining storage groups.. 27 Understanding storage groups........ 27 DASD storage groups.......... 28 DASD volume status for data sets...... 28 Object and object backup storage groups... 29 OAM collection names......... 32 Tape storage groups.......... 32 Planning storage groups for data sets...... 33 Planning storage groups for OAM object collections 34 Defining storage group attributes....... 36 Storage group types.......... 36 Defining a VIO storage group....... 38 Defining a pool storage group....... 39 Assigning DASD storage groups to data sets.. 48 Defining a dummy storage group...... 48 Defining a copy pool backup storage group.. 50 Defining an object storage group...... 50 Defining an object backup storage group... 53 Defining object or object backup storage group status............... 56 Assigning an OAM object collection to a storage group............... 57 Defining a tape storage group....... 57 Defining tape storage group status..... 58 Defining additional storage groups...... 59 Listing volumes in a storage group...... 59 Chapter 5. Defining reserve storage pools............... 61 Understanding reserve storage pools...... 61 Assigning volumes to a reserve storage pool... 61 Copyright IBM Corp. 1984, 2017 iii

Chapter 6. Defining clouds...... 63 Chapter 7. Defining management classes.............. 67 Understanding management classes...... 67 Default management class........ 67 OAM management classes........ 68 Describing management classes....... 68 Planning management classes........ 68 Defining management class attributes..... 69 Defining management class expiration attributes 70 Defining management class migration attributes 74 Defining management class backup attributes.. 76 Defining class transition attributes...... 79 Defining aggregate backup attributes..... 80 Assigning management classes........ 81 Defining additional management classes..... 82 Chapter 8. Defining storage classes.. 83 Understanding storage classes........ 83 Storage classes for data sets........ 84 Storage classes for objects........ 84 Planning storage classes.......... 85 Defining storage class attributes....... 85 Defining performance objectives...... 86 Defining availability.......... 93 Defining accessibility.......... 93 Defining the guaranteed space attribute.... 95 Defining guaranteed synchronous write.... 99 Defining use of the coupling facility for VSAM record-level sharing.......... 99 Defining when to disconnect the sphere... 100 Assigning storage classes......... 100 Defining additional storage classes...... 101 SMS volume selection for data set allocation... 101 Volume selection preference attributes.... 102 Conventional volume selection...... 103 Striping volume selection........ 106 Tuning considerations......... 109 Cluster and storage facility image considerations 109 Spreading allocations across multiple volumes 110 Space constraint relief......... 110 Using the multi-tiered storage group function 110 Using the parallel access volume option... 111 Possible reasons for volume selection failure.. 114 Defining secondary lock tables....... 115 Chapter 9. Defining data classes... 117 Understanding data classes......... 117 Planning data classes........... 117 Defining data class attributes........ 118 Defining record and space attributes for data class............... 119 Defining volume and data set attributes for data class............... 122 Specifying attributes to handle space constraints during allocation........... 127 Defining VSAM attributes and specifying media types for data class.......... 129 Defining the encryption management mechanism............. 132 Defining Shareoptions and RLS attributes for data class.............. 132 Specifying attributes for data set reuse and loading.............. 134 Specifying attributes for backup-while-open (BWO) and recovery.......... 135 Assigning data classes.......... 136 Specifying data classes outside ACS routines 137 Processing data class attributes in JCL.... 137 Defining additional data classes....... 138 Chapter 10. Defining aggregate groups.............. 139 Understanding aggregate groups....... 139 Planning aggregate groups......... 140 Defining aggregate groups......... 140 Defining aggregate group attributes..... 141 Editing aggregate group attributes..... 141 Backing up and recovering an aggregate group 143 Defining additional aggregate groups..... 143 Chapter 11. Defining copy pools... 145 Planning a copy pool........... 146 Defining a copy pool........... 146 Steps for defining a copy pool....... 146 Defining a copy pool backup storage group... 150 Chapter 12. Defining ACS routines 151 Understanding ACS routines........ 151 Using ACS routines for data sets created by z/os Network File System and Distributed FileManager/MVS........... 152 Restrictions on using ACS routines..... 152 Creating ACS routines.......... 153 Translating ACS routines......... 153 Browsing the results of a translation..... 154 Browsing the results of an unsuccessful translation............. 155 Validating ACS routines or an entire SCDS... 155 Validating an ACS routine........ 155 Validating an entire SCDS........ 157 Translating and validating in a sysplex environment.............. 159 Testing ACS routines........... 159 ACS test usage............ 160 Creating ACS test cases......... 160 Running ACS test cases......... 161 ACS routines invoked for copying and importing data sets.......... 161 ACS routines invoked for restoring, recalling, recovering, and converting data sets..... 163 ACS routine environments......... 165 JCL DD statement (batch), and dynamic allocation.............. 166 Volume reference........... 166 Data set stacking........... 168 Non-data set stacking allocations...... 170 Tape management system support..... 172 iv z/os DFSMSdfp Storage Administration

Access Method Services......... 173 DFSMShsm............. 174 DFSMSdss............. 174 DFSMSrmm............. 175 ISMF............... 176 OAM............... 176 Processing of SMS classes and storage groups 176 Displaying ACS object information...... 177 Deleting an ACS object from an SCDS..... 177 Using security labels in ACS routines..... 178 Planning and installing......... 178 Administering............ 179 Chapter 13. Activating Storage Management Subsystem configurations........... 185 Manually activating the first Storage Management Subsystem configuration......... 185 Step one: IPL each system in the SMS complex 185 Step two: prepare one system....... 185 Step three: activate the configuration from one system.............. 185 Step four: activate SMS on the other systems 186 Automatically activating a Storage Management Subsystem configuration......... 186 Converting the SMS configuration from compatibility to 32-system mode....... 186 Displaying storage management subsystem information.............. 188 Controlling DFSMStvs processing...... 188 Monitoring application programs that use DFSMStvs............. 188 Changing DFSMStvs status........ 188 Changing Storage Management Subsystem parameters.............. 189 Parameters of the SETSMS operator command 189 SETSMS command to alter the setting of BreakPointValue........... 189 SETSMS command to alter the setting of USEEAV.............. 189 Considerations when changing Storage Management Subsystem configurations.... 190 OAM considerations when changing SCDSs.. 190 Chapter 14. Maintaining the Storage Management Subsystem...... 193 Displaying SMS and OAM information..... 193 Displaying information about the active configuration............ 193 Displaying SMS TRACE information.... 194 Displaying storage group status using the DISPLAY SMS command........ 195 Displaying OAM status in a parallel sysplex.. 197 Displaying the caching statistics...... 198 Displaying storage group status using ISMF.. 198 Displaying volume status using ISMF.... 199 Displaying volumes using the DISPLAY SMS command............. 201 Displaying the device status....... 201 Listing SMS classes, aggregate groups, storage groups, and libraries using ISMF....... 210 Listing with view and sort........ 210 Listing data classes.......... 211 Listing storage groups, management classes, storage classes, aggregate groups, libraries and drives............... 212 Altering data set associations........ 212 Altering SMS components......... 212 Altering storage groups......... 213 Redefining volumes among storage groups.. 213 Altering management classes....... 214 Altering storage classes......... 215 Altering data classes.......... 216 Altering copy pools.......... 217 Altering aggregate groups........ 217 Altering the SCDS on different DFSMS releases 219 Copying SMS components......... 219 Deleting DASD volumes from the system.... 220 Deleting DASD volumes from storage groups.. 221 Deleting storage groups.......... 221 Deleting or moving system-managed data sets from the storage group......... 221 Preventing job failures......... 222 Deleting SMS classes........... 222 Converting volumes to SMS........ 223 Deleting DASD volume residual data..... 223 Chapter 15. Recovering Storage Management Subsystem information. 225 Recovering control data sets........ 225 Recovering an SCDS.......... 225 Recovering an ACDS.......... 226 Recovering a COMMDS......... 227 Recovering from a systems failure in the SMS complex............... 227 Recovering the SMS address space...... 228 Canceling the SMS address space....... 228 Chapter 16. Protecting the Storage Management Subsystem...... 229 Identifying the resource owner and extracting the default classes............. 229 Protecting ISMF functions......... 229 Locating module names for ISMF applications.. 231 Locating module names for ISMF functions... 231 Locating module names for line operators and commands.............. 233 Protecting modules........... 236 Storage administration (STGADMIN) profiles in the FACILITY class........... 237 Command and keyword related profiles... 237 Authority to activate a Storage Management Subsystem configuration........ 241 FIELD resource class........... 241 How authorization and protection of classes differ 242 Authorizing the storage and management classes............... 242 Protecting the control data sets...... 242 Authorizing for TSO/E and ISPF...... 242 Contents v

Storage administrator authorization..... 243 Chapter 17. Administering VSAM record-level sharing........ 245 Preparing for VSAM record-level sharing.... 245 Determining hardware requirements.... 245 Understanding the product environment for VSAM RLS............. 246 Determining applications that can use VSAM RLS............... 246 Ensuring same systems connectivity..... 247 Planning for availability......... 249 Defining sharing control data sets..... 249 Defining CF cache structures....... 253 Defining the primary CF lock structure.... 255 Modifying the SYS1.PARMLIB IGDSMSxx member.............. 259 Establishing authorization for VSAM RLS... 260 Using dsstimeout........... 261 Defining CF cache structures in the SMS base configuration............. 262 Defining storage classes for VSAM RLS.... 263 Defining VSAM RLS attributes in data classes.. 264 Activating VSAM RLS.......... 264 Enabling VSAM RLS processing...... 264 Enabling a data set for VSAM RLS processing 265 Monitoring the coupling facility for VSAM RLS 265 Displaying CF information........ 265 Changing the size of coupling facility cache structures.............. 267 Changing the size of coupling facility lock structures.............. 268 Changing IGDSMSxx parameters to support the coupling facility........... 269 Changing the state of coupling facility cache structures and volumes......... 272 Selecting data sets for coupling facility statistical monitoring............. 272 Recovering VSAM RLS processing...... 273 Recovering the CF lock structure...... 273 Recovering a CF cache structure...... 274 Recovering the SMSVSAM server address space 274 Recovering a shared control data set..... 274 Falling back from VSAM RLS processing.... 275 Fallback rules and considerations...... 275 Fallback procedure.......... 275 Terminating the SMSVSAM address space.... 277 Quiescing or enabling a secondary lock structure 277 Deleting a VSAM RLS lock structure..... 277 Displaying information about a secondary lock structure............... 278 Chapter 18. Writing ACS routines... 279 Constants.............. 279 Simple mask rules........... 280 Simple mask examples......... 280 Data set mask rules.......... 280 Data set mask examples......... 281 Read-write variables........... 281 Using read-write variables with volume reference (VOL=REF).......... 282 Using read-write variables with data set stacking.............. 282 Read-only variables........... 283 Using read-only variables........ 292 Constraints when using read-only variables.. 295 Comparison operators......... 296 Comparison rules........... 296 Boolean expressions.......... 297 Special functions........... 297 Determining Distributed FileManager/MVS data set creation requests........ 299 Statements.............. 300 PROC statement........... 301 FILTLIST statement.......... 302 SET statement............ 303 DO statement............ 304 IF statement............. 304 SELECT statement........... 305 EXIT statement............ 307 WRITE statement........... 307 END statement............ 309 Sample ACS routine.......... 309 Chapter 19. Quick reference to ISMF commands and line operators.... 311 Chapter 20. SETCACHE functions and device information......... 319 Maintaining the media characteristics of a volume 319 Modifying DASD storage control characteristics 320 Modifying caching characteristics...... 320 Modifying duplexing characteristics..... 321 Modifying destaging characteristics..... 322 Submitting jobs............ 322 Providing remote authorization codes..... 323 Chapter 21. Space utilization and capacity planning......... 325 Using the data collection application..... 325 Chapter 22. Using data set separation 329 Overview............... 329 Syntax for creating a data set separation profile 330 Deprecated syntax........... 330 Writing comments........... 331 Indicating continuation and termination... 332 Example.............. 332 Volume selection for data set separation by volume 332 Data set requirements for a data set separation profile................ 333 Creating multiple data set separation profiles... 333 Using data set separation with generation data groups and striping........... 333 Environmental conditions affecting data set separation.............. 334 Factors affecting code path length...... 334 vi z/os DFSMSdfp Storage Administration

Chapter 23. Using NaviQuest..... 335 Starting NaviQuest........... 335 Terminology............. 336 Methods for collecting test data....... 337 ISMF lists............. 337 DCOLLECT data........... 337 SMF data.............. 338 VMA data............. 338 Data classification methodology....... 338 Testing ACS routines........... 339 Setting up the test environment...... 339 Testing procedures.......... 341 NaviQuest testing scenario........ 347 Performing storage administration tasks in batch 348 How to run storage administration tasks in batch............... 348 Using the sample JCL for batch...... 349 NaviQuest CLISTS and REXX EXECS.... 355 Storage group volume add/delete: ACBQBAI9 378 ACS routine translate: ACBQBAO1..... 381 SCDS validation: ACBQBAO2....... 384 Test ACS routines: ACBQBAIA...... 386 Generate test cases from ISMF-saved data set lists: ACBQBAG3........... 387 Generate test cases from DCOLLECT data: ACBQBAG1............. 388 Generate test cases from SMF data..... 389 Generate test cases from VMA extract data: ACBQBAO3............. 390 ACS test listings comparison: ACBQBAC1... 391 Enhanced ACS test listing: ACBQBAX1.... 392 Update test cases with expected results: ACBQBAU1............. 394 Generate report from ISMF-saved data set list: ACBQBAR1............. 395 Generate report from ISMF-saved DASD volume list: ACBQVAR1......... 399 Generate report from ISMF-saved tape list: ACBQBAR4............. 402 Generate data set report from DCOLLECT data: ACBQBAR7............. 404 Generate model commands from ISMF-saved list: ACBQBAM1........... 407 Creating SMS online reports........ 408 Creating data set reports from saved ISMF lists 409 Creating volume reports from saved ISMF lists 409 Creating customized tape reports from saved ISMF lists............. 410 Data set report from DCOLLECT data.... 410 DASD volume report from DCOLLECT data.. 411 SMS configuration report from DCOLLECT data 411 Additional storage administration functions... 411 QSAVE and QRETRIEV commands: saving and retrieving ISMF selection criteria...... 411 Creating model commands........ 412 COPYFILT macro: COPYLIB facility for FILTLISTs............. 415 Appendix A. Sample Batch Job for CICS Definitions.......... 417 Appendix B. Accessibility...... 419 Accessibility features........... 419 Consult assistive technologies........ 419 Keyboard navigation of the user interface.... 419 Dotted decimal syntax diagrams....... 419 Notices.............. 423 Terms and conditions for product documentation 425 IBM Online Privacy Statement........ 426 Policy for unsupported hardware....... 426 Minimum supported hardware....... 426 Programming interface information...... 427 Trademarks.............. 427 Index............... 429 Contents vii

viii z/os DFSMSdfp Storage Administration

Figures 1. ISMF Primary Option Menu for Storage Administrators............ 2 2. System Grouping Concept........ 7 3. Relationship among SCDSs and ACDSs in an Installation............. 10 4. Formula for Deriving Optimum Number of Stripes.............. 34 5. Defining Volume System Status...... 47 6. Defining Dummy Storage Group Volume Serial Numbers............. 50 7. Allocation of Primary and Secondary Space for Multivolume Data Sets......... 97 8. Allocation of Primary and Secondary Space for Multivolume Data Sets with Different Primary Allocations on Each Volume....... 98 9. Editing an Aggregate Group Selection Data Set- Example............ 142 10. Pool Storage Groups and Copy Pool Backup Storage Groups........... 145 11. Browsing the Results of an Unsuccessful ACS Translation............ 155 12. Browsing the Results of an ACS Routine Validation............. 157 13. Example of REF=ST Values when Using VOL=REF............. 167 14. Example of REF=NS Values when Using VOL=REF............. 168 15. Example of Failing VOL=REF Values That Are Not Valid........... 168 16. Example of a Storage Class ACS Routine for Read-Only Variables......... 170 17. Example of a Storage Group ACS Routine for Read-Only Variables......... 170 18. Example of a Storage Class ACS Routine Specifying Both Volume Reference and Unit Affinity............. 172 19. Displaying Information about the Active Configuration........... 194 20. Displaying Trace Information...... 194 21. DISPLAY SMS,STORGRP Command Syntax 195 22. Displaying Storage Group Status Information 196 23. Displaying Storage Group Volume Status Information............ 197 24. Displaying Cache and DASD Fast Write Information............ 198 25. Displaying Status Information for Individual DASD Volumes........... 201 26. DEVSERV S,430 Output........ 202 27. DEVSERV QPAVS Display Content.... 204 28. DS QP,D123,3 Output......... 205 29. DS QP,D2FF,VOLUME Output...... 205 30. DS QP,D222,VOLUME Output...... 205 31. DS QP,D6FF,UNBOX Output...... 206 32. DS QP,D5EF,UCB Output....... 206 33. DS QP,SSID=1401 Output....... 207 34. DS QP,D345 Output......... 207 35. DS QP,D621 Output......... 207 36. DS QP,D6F4 Output......... 207 37. DS QP,F60 Output.......... 208 38. DS QP,E27F,HPAV Output....... 208 39. DS QP,E200,HPAV Output....... 208 40. DS QP,E27F,VOLUME Output...... 209 41. DEVSERV P,F4A Output........ 209 42. DS QD,F41,RDC,DCE Output...... 210 43. Example of Global Connectivity in a Parallel Sysplex............. 248 44. Example of Insufficient Connectivity in a Parallel Sysplex........... 248 45. Example for Creating Sharing Control Data Sets Using IDCAMS......... 251 46. Example of CF Cache Structure Definition in Base Configuration.......... 263 47. DISPLAY SMS command........ 266 48. Example of Constraints when Using the &ALLVOL and &ANYVOL Read-Only Variables............. 298 49. Example Showing &JOB Read-Only Variable 300 50. Example Showing &PGM Read-Only Variable 300 51. Example Showing &USER Read-Only Variable............. 300 52. Example of a FILTLIST Statement..... 302 53. Using the INCLUDE and EXCLUDE 303 54. Example of a DO Statement....... 304 55. Examples of IF Statements....... 305 56. Example of a SELECT Statement..... 306 57. Example of an EXIT Statement...... 307 58. Example of an END Statement...... 309 59. Production ACS Routine for Storage Class 309 60. Typical Data Types.......... 338 61. TSO Data Type with Data Subtypes.... 339 62. SYS1.SACBCNTL member ACBJBAOB JCL for Batch Functions Part 1 of 2....... 353 63. SYS1.SACBCNTL member ACBJBAOB JCL for Batch Functions Part 2 of 2....... 354 64. Sample JCL for ACBJBAI2....... 363 65. Sample JCL for ACBJBAI2 (continued) 364 66. Sample JCL for ACBJBAI4 Part 1 of 3 368 67. Sample JCL for ACBJBAI4 Part 2 of 3 368 68. Sample JCL for ACBJBAI4 Part 3 of 3 369 69. Sample JCL for ACBJBAIA....... 370 70. Sample JCL for ACBJBAIA part 2 of 2 371 71. Sample JCL for ACBJBAJ1....... 372 72. Sample JCL for ACBJBAJ1 (continued) 373 73. Sample JCL for ACBJBAJ1 (continued) 374 74. Sample JCL for ACBJBAJ1 (continued) 375 75. Sample JCL for ACBJBAJ1 (continued) 376 76. Sample JCL for ACBJBAJ1 (continued) 377 77. Sample JCL for ACBJBAJ1 (continued) 378 78. Sample JCL for ACBJBAIB....... 379 79. Sample JCL for ACBJBAIB (continued) 380 80. Sample JCL for ACBJBAC2....... 381 81. Sample JCL for ACBJBAC2 (continued) 382 Copyright IBM Corp. 1984, 2017 ix

82. Sample JCL for ACBJBAC2 (continued) 383 83. Sample JCL for ACBJBAC2 (continued) 384 84. Sample JCL for ACBJBAOS....... 385 85. Sample JCL for ACBJBAIC....... 387 86. Sample JCL for ACBJBAG2....... 388 87. Sample JCL for ACBJBAG1....... 389 88. Sample JCL for ACBJBAI1....... 390 89. Sample JCL for ACBJBAOW...... 390 90. Sample JCL for ACBJBAC1....... 392 91. Sample JCL for ACBJBAX1....... 393 92. Sample JCL for ACBJBAX1 (continued) 394 93. Sample JCL for ACBJBAU2....... 395 94. Sample JCL for ACBJBAOD....... 397 95. Sample JCL for ACBJBAOD (continued) 398 96. Sample JCL for ACBJBAOF....... 400 97. Sample JCL for ACBJBAOF (continued) 401 98. Sample JCL for ACBJBAOT....... 403 99. Sample JCL for ACBJBAOT (continued) 404 100. Sample JCL for ACBJBARD....... 406 101. Sample JCL for ACBJBARD (continued) 407 102. Sample JCL for ACBJBAM1....... 408 103. Copy FILTLISTs Entry Panel...... 416 x z/os DFSMSdfp Storage Administration

Tables 1. Summary of media selection for object storage 35 2. Volumes Listed in a Specified Storage Group 60 3. Comparing Retention Period Attributes 73 4. MSR Capabilities........... 87 5. D/T3990 SMS Cache Candidate Tokens for Sequential and Direct Requests...... 90 6. Combinations for Requesting Point-in-Time Copy Devices............ 95 7. Volume Selection Preference Attributes 102 8. Applying Data Class Attributes to Record Organization (Recorg)......... 130 9. Results of Output Listing Disposition 154 10. Allocation, IMPORT, and COPY Conditions 161 11. RESTORE, RECALL, RECOVER, CONVERTV, and FORCENONSMS Conditions..... 163 12. Values for &UNIT ACS Read-Only Variable 169 13. AFFing DD Volser Values....... 171 14. DFSMSrmm Read-Only Variables..... 175 15. Module Names for ISMF Applications 231 16. Module Names for ISMF Functions.... 232 17. Module/CLIST Names for ISMF Line Operators, Part 1.......... 233 18. Module/CLIST Names for ISMF Line Operators, Part 2.......... 234 19. Module/CLIST Names for ISMF Line Operators, Part 3.......... 234 20. Module/CLIST Names for ISMF Commands 235 21. Effect of MAXSYSTEM Value on Lock Table Entry Size............. 255 22. CF Lock Structure Sizing Examples.... 255 23. Using Read-Write Variables in ACS Routines 282 24. Read-Only Variables......... 283 25. Indexing Functions for Read-Only Variables 297 26. Read-Write Variable Assignments..... 304 27. ISMF Commands.......... 311 28. ISMF Line Operators......... 314 29. PCU-Level Syntax Examples...... 331 30. SYS1.SACBCNTL Sample JCL Library Member List............ 350 31. CLISTs and REXX EXECs for Storage Administration Tasks......... 355 32. Using ACBQBAI2 Parameters...... 359 33. ACBQBAI4 Parameters........ 365 34. ACBQBAID Parameters........ 369 Copyright IBM Corp. 1984, 2017 xi

xii z/os DFSMSdfp Storage Administration

About this document Required product knowledge Notational conventions This document introduces system programmers and storage administrators to the IBM Storage Management Subsystem (SMS) and storage management concepts. It describes how to define, initialize, and maintain SMS and how to manage storage with the IBM Interactive Storage Management Facility (ISMF). This document is intended for system programmers and storage administrators like you who manage storage under DFSMS. If you are new to SMS and ISMF, you should start with Chapter 1, Introducing the Storage Management Subsystem, on page 1 so that you can familiarize yourself with the products first. This document is specific to DFSMSdfp. For information about DFSMShsm and DFSMSdss, see z/os DFSMShsm Storage Administration and z/os DFSMSdss Storage Administration. For information about the accessibility feature of z/os, for users who have a physical disability, see Appendix B, Accessibility, on page 419. To use this document effectively, you should be familiar with: v Storage management concepts v ISMF applications v DFSMS Data Set Services (DFSMSdss) v DFSMS Hierarchical Storage Manager (DFSMShsm) v Device Support Facility (ICKDSF) v Object access method (OAM) A uniform notation describes the syntax of commands. This notation is not part of the language; it is merely a way of describing the syntax of the commands. The command syntax definitions in this document use the following conventions: [ ] Brackets enclose an optional entry. You can, but need not, include the entry. Examples are: [length] [MF=E] An OR sign (a vertical bar) separates alternative entries. You must specify one, and only one, of the entries unless you allow an indicated default. Examples are: [REREADLEAVE] [length's'] { } Braces enclose alternative entries. You must use one, and only one, of the entries. Examples are: BFTEK={SA} {KD} {addressso} Sometimes alternative entries are shown in a vertical stack of braces. An example is: Copyright IBM Corp. 1984, 2017 xiii

MACRF={{(R[CP])}{(W[CPL])} {(R[C],W[C])}} In the example above, you must choose only one entry from the vertical stack.... An ellipsis indicates that the entry immediately preceding the ellipsis might be repeated. For example: (dcbaddr,[(options)],...) A indicates that a blank (an empty space) must be present before the next parameter. UPPERCASE BOLDFACE Uppercase boldface type indicates entries that you must code exactly as shown. These entries consist of keywords and the following punctuation symbols: commas, parentheses, and equal signs. Examples are: CLOSE,,,,TYPE=T MACRF=(PL,PTC) UNDERSCORED UPPERCASE BOLDFACE Underscored uppercase boldface type indicates the default used if you do not specify any of the alternatives. Examples are: [EROPT={ACCSKPABE}] [BFALN={FD}] Lowercase Italic Lowercase italic type indicates a value to be supplied by you, the user, usually according to specifications and limits described for each parameter. Examples are: number image-id count. xiv z/os DFSMSdfp Storage Administration

z/os information This information explains how z/os references information in other documents and on the web. When possible, this information uses cross document links that go directly to the topic in reference using shortened versions of the document title. For complete titles and order numbers of the documents for all products that are part of z/os, see z/os Information Roadmap. To find the complete z/os library, go to IBM Knowledge Center (www.ibm.com/support/knowledgecenter/ssltbw/welcome). Copyright IBM Corp. 1984, 2017 xv

xvi z/os DFSMSdfp Storage Administration

How to send your comments to IBM We appreciate your input on this documentation. Please provide us with any feedback that you have, including comments on the clarity, accuracy, or completeness of the information. Use one of the following methods to send your comments: Important: If your comment regards a technical problem, see instead If you have a technical problem. v Send an email to mhvrcfs@us.ibm.com. v Send an email from the Contact z/os web page (www.ibm.com/systems/z/os/ zos/webqs.html). Include the following information: v Your name and address v Your email address v Your phone or fax number v The publication title and order number: z/os DFSMSdfp Storage Administration SC23-6860-30 v The topic and page number or URL of the specific information to which your comment relates v The text of your comment. When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute the comments in any way appropriate without incurring any obligation to you. IBM or any other organizations use the personal information that you supply to contact you only about the issues that you submit. If you have a technical problem Do not use the feedback methods that are listed for sending comments. Instead, take one or more of the following actions: v Visit the IBM Support Portal (support.ibm.com). v Contact your IBM service representative. v Call IBM technical support. Copyright IBM Corp. 1984, 2017 xvii

xviii z/os DFSMSdfp Storage Administration

Summary of changes This information includes terminology, maintenance, and editorial changes. Technical changes or additions to the text and illustrations for the current edition are indicated by a vertical line to the left of the change. Summary of changes for z/os Version 2 Release 3 (V2R3) The following changes are made for z/os V2R3. New This edition includes the following new information: v Support for read-only volumes has been added to Allocating control data sets on page 9, Displaying the status of volumes in the storage group on page 196, and Displaying volumes using the DISPLAY SMS command on page 201. v Defining the encryption management mechanism on page 132 describes the label for the encryption key used by the access methods. v Description of the FS setting for the &RECORG variable added to Read-only variables on page 283 v Chapter 6, Defining clouds, on page 63 describes how to define constructs to enable DFSMS data storage on a cloud. Changed This edition includes the following topics that contain changed information: v Changed by adding new DATAKEY field to the RACF DATASET profile. See Chapter 16, Protecting the Storage Management Subsystem, on page 229 for more information. v Changed to reflect that OAM collections are no longer maintained in the catalog. See OAM collection names on page 32 for more information. v Changed by adding new OAM DB2 ID value and description. See Attributes of the object storage group on page 51 for more information. v Changed by adding new OAM DB2 ID value and description. See Object and object backup storage groups on page 29 for more information. v Changed by adding new &DB2SSID variable to table. See Read-only variables on page 283 for more information. v Changed by adding description of new &DB2SSID variable. See Read-only variables on page 283 for more information. v Changed to reflect that OAM collections are no longer maintained in the catalog. See Default management class on page 67 for more information. v Changed to reflect that OAM collections are no longer maintained in the catalog. See Storage classes for objects on page 84 for more information. v Changed to reflect that OAM collections are no longer maintained in the catalog. See Assigning an OAM object collection to a storage group on page 57 for more information. v Changed to include a description of the &DB2SSID variable. See Using OAM read-only variables on page 293 for more information. Copyright IBM Corp. 1984, 2017 xix

v Changed to include new management class expiration attributes. See Defining management class expiration attributes on page 70 for more information. Summary of changes for z/os Version 2 Release 2 (V2R2) Changes made for z/os V2R2 New v New read-only variable &USER_ACSVAR for use in ACS routines. For details, refer to Chapter 18, Writing ACS routines, on page 279. v New Total Space Alert Threshold % and Track-Managed Space Alert Threshold % attributes for defining a pool storage group. For details, refer to Values for defining a pool storage group on page 39. Changed The Reduce Space Up To (%) attribute for data classes is now used when allocating secondary extents, to provide more efficient use of space. For details, refer to Specifying attributes to handle space constraints during allocation on page 127. Summary of changes for z/os Version 2 Release 1 (V2R1) as updated March, 2014 The following changes are made for z/os Version 2 Release 1 (V2R1) as updated March, 2014. In this revision, all technical changes for z/os V2R1 are indicated by a vertical line to the left of the change. New The ZR ( zedc Required ) and ZP ( zedc Preferred ) options are added to the Compaction field in Defining volume and data set attributes for data class on page 122. Note: For more information on the zedc compression enhancements, see z/os DFSMS Using the New Functions. z/os Version 2 Release 1 summary of changes See the Version 2 Release 1 (V2R1) versions of the following publications for all enhancements related to z/os V2R1: v z/os Migration v z/os Planning for Installation v z/os Summary of Message and Interface Changes v z/os Introduction and Release Guide xx z/os DFSMSdfp Storage Administration

Chapter 1. Introducing the Storage Management Subsystem This topic introduces the Storage Management Subsystem (SMS). It explains various applications of the Interactive Storage Management Facility (ISMF) so that you can use them to define your storage management policy and manage your SMS configurations. It also provides an overview of the preparatory tasks for implementing SMS and explores considerations for running SMS in a Parallel Sysplex environment and on mixed DFSMS releases. Understanding the Storage Management Subsystem The Storage Management Subsystem (SMS) is a DFSMS facility designed for automating and centralizing storage management. Using SMS, you can describe data allocation characteristics, performance and availability goals, backup and retention requirements, and storage requirements to the systems. SMS improves storage space use, allows central control of external storage, and enables you to manage storage growth more efficiently. With SMS, you can easily manage conversion between device types and ultimately move toward system-managed storage. Using the Interactive Storage Management Facility The Interactive Storage Management Facility (ISMF) provides a series of applications for storage administrators to define and manage SMS configurations. You can use these applications to: v Define SMS base configuration information. v Define, alter, delete, or copy individual SMS classes, storage groups, aggregate groups, optical libraries, optical drives, and tape libraries. v Display parameters and values of individual SMS classes, storage groups, aggregate groups, mountable optical volumes, optical drives, mountable tape volumes, tape libraries and optical libraries. v Generate, save and manage lists of SMS classes, storage groups, aggregate groups, mountable optical volumes, optical libraries, optical drives, mountable tape volumes and tape libraries. v Edit ACS routines. v Define, alter, and execute ACS test cases. v Validate the correctness and completeness of an SMS configuration. v Activate an SMS configuration. v Display, define, alter, or delete storage group information pertaining to specific volumes using AUDIT, EJECT, ALTER, and RECOVER (RECOVER is for optical volumes only). v Produce data set, volume, or capacity planning measurement data. v Maintain mountable optical volumes and mountable tape volumes. v Use DFSMSrmm to maintain tape volumes. v Use the DFSMS NaviQuest tool to perform enhanced testing of your ACS routines, and to perform many storage management tasks in batch, such as: Updating and testing your base configuration Translating and testing your ACS routines Copyright IBM Corp. 1984, 2017 1

Generating test cases from previously collected DCOLLECT data Defining, altering, and displaying information for management classes, data classes and storage classes Defining or altering information for storage groups Defining, altering, and displaying information for the base configuration, as well as for aggregate groups Generating data set and volume lists and reports Diagnosing data set and volume problems See Chapter 23, Using NaviQuest, on page 335 for more information on the DFSMS NaviQuest tool. Figure 1 shows the ISMF Primary Option Menu for storage administrators. Panel Help ------------------------------------------------------------------------------ ISMF PRIMARY OPTION MENU - z/os DFSMS V1 R12 Selection or Command ===> 0 ISMF Profile - Specify ISMF User Profile 1 Data Set - Perform Functions Against Data Sets 2 Volume - Perform Functions Against Volumes 3 Management Class - Specify Data Set Backup and Migration Criteria 4 Data Class - Specify Data Set Allocation Parameters 5 Storage Class - Specify Data Set Performance and Availability 6 Storage Group - Specify Volume Names and Free Space Thresholds 7 Automatic Class Selection - Specify ACS Routines and Test Criteria 8 Control Data Set - Specify System Names and Default Criteria 9 Aggregate Group - Specify Data Set Recovery Parameters 10 Library Management - Specify Library and Drive Configurations 11 Enhanced ACS Management - Perform Enhanced Test/Configuration Management C Data Collection - Process Data Collection Function G Report Generation - Create Storage Management Reports L List - Perform Functions Against Saved ISMF Lists P Copy Pool - Specify Pool Storage Groups for Copies R Removable Media Manager - Perform Functions Against Removable Media X Exit - Terminate ISMF Use HELP Command for Help; Use END Command or X to Exit. Figure 1. ISMF Primary Option Menu for Storage Administrators This primary option menu differs from the one that end users see. To the options found on the ISMF Primary Option Menu for end users, this primary option menu adds the following: v Storage Group v Automatic Class Selection v Control Data Set v Library Management v Data Collection v Enhanced ACS Management v Copy Pool Additionally, the management class, data class, storage class, and aggregate group applications available through the ISMF Primary Option Menu for Storage Administrators allow you to define, alter, copy, and delete SMS classes. End users can list the available SMS classes, display the attributes of individual SMS classes, and list or display volumes and data sets. To learn how to use the ISMF Data Collection application, see Chapter 21, Space utilization and capacity planning, on page 325. 2 z/os DFSMSdfp Storage Administration

Customizing ISMF There might be times when you want to customize the interactive storage management facility (ISMF). This topic lists the libraries that you can customize and some restrictions. For more information, see z/os DFSMS Using the Interactive Storage Management Facility, which describes ISMF restrictions and customization with DFSMSdss. ISMF libraries that can be customized You can customize the following ISMF libraries: Panel Library ISMF allows you to make the following changes: v Change the initial priming values that ISMF ships v Change the default values for data entry panels v Provide additional restrictions to values that are entered for certain fields on panels v Remove fields from functional panels v Change highlighting and color v Change the format of the panel v Modify existing functional panel text and help text v Add new fields to panels v Add new panels. Message Library You can modify existing messages and add new messages. Skeleton Library You can modify the job skeletons for ISMF commands and line operators. Table Library You can modify the Interactive System Productivity Facility (ISPF) command tables. Load Library You can modify the ISMF command and line operator tables. The tables are contained in nonexecutable CSECTs in the load library. CLIST Library You can modify the options on the CLIST CONTROL statement. Restrictions to customizing ISMF: include the following: General restrictions for ISMF customization 1. Before changing anything, you should make a backup copy of ISMF. Keep this unmodified version of the product for diagnostic purposes. IBM support and maintenance is provided only for the unmodified version of ISMF. 2. Do not delete or rename any of the parts of ISMF. Deleting or renaming severely affects processing and can cause ISMF to fail. 3. ISMF is copyrighted. Under the IBM licensing agreement you may modify ISMF for your own use. You may not, however, modify it for commercial resale. Defining your storage management policy SMS manages an installation s storage according to the currently active storage management policy. Through ISMF, you define an installation storage management policy in an SMS configuration. An SMS configuration contains the following: v Base configuration information v Classes and groups Chapter 1. Introducing the Storage Management Subsystem 3

v Automatic class selection (ACS) routines v Optical library and drive definitions v Tape library definitions The base configuration identifies the systems that the SMS configuration manages. These systems constitute an SMS complex. The base configuration also contains installation defaults. You can define more than one control data set, but only one at a time controls SMS. Each control data set defined for SMS is called a source control data set (SCDS). The control data set that is in effect at a given time is the active control data set (ACDS). SMS classes and groups are lists of traits and characteristics that are associated with or assigned to data sets, objects and volumes. An SMS configuration can contain the following types of classes and groups: Storage group Use this to define a list of volumes and manage them as if they were one large, single volume. SMS applies the properties you assign to a storage group to all the volumes within the storage group. Management class Use this to define different levels of migration, backup, class transition and retention services. Through management class, you can associate a level of service with a data set or object that is independent of the physical location of the data set or object. Also, you can identify a data set or an object characteristic that might trigger a class transition. Storage class Use this to define different levels of performance and availability services. Through storage class, you can separate the level of service for a data set or object from physical device characteristics. You can also separate the level of service for an object with different storage classes used to place objects at various levels of the storage hierarchy. Data class Use this to define allocation defaults. Through data class, you can simplify and standardize the allocation of new data sets. Aggregate group Use this to define groups of data sets for the purpose of backing up or recovering all data sets in a group in a single operation. Copy pool Use this to define a pool of storage groups to be processed collectively for fast replication operations. An SMS configuration can contain multiple constructs of each type. Data sets managed by SMS are called system-managed. Each system-managed data set or object must reside in a storage group. The system-managed data sets must have a storage class, and might also have a management class and a data class. The objects must have a storage class and a management class. You can assign the same name to various SMS classes and a storage group. For example, a data class and a storage class can have the same name. 4 z/os DFSMSdfp Storage Administration

ACS routines determine the SMS classes and storage groups for data sets and objects. You can also use ACS routines to control the transition of data sets to and from SMS management (objects are always SMS-managed). Preparing for and implementing the Storage Management Subsystem To prepare for and implement a storage management policy, you perform these steps: 1. Prepare for SMS, as described in Chapter 2, Preparing for the Storage Management Subsystem, on page 9. This includes: a. Allocating control data sets, which contains information used by SMS. b. Defining SMS as trusted to RACF, which generally allows the SMS address space to bypass RACF authorization checking and to successfully access the SMS configuration data sets. For more information, refer to Defining SMS as trusted to RACF on page 14. c. Modifying and creating SYS1.PARMLIB members to identify SMS to all the systems in the SMS complex. These new members take effect when you IPL. d. Establishing access to the ISMF Primary Option Menu for Storage Administrators, which is shown in Figure 1 on page 2. This is the final preparation step. 2. Define the base configuration, which identifies the systems within the SMS complex. See Chapter 3, Creating the base configuration, on page 19. 3. Define the SMS classes and storage groups that you want SMS to assign to your data sets and objects, and the data sets that you want to assign to your aggregate groups. See Chapter 4, Defining storage groups, on page 27, Chapter 7, Defining management classes, on page 67, Chapter 8, Defining storage classes, on page 83, Chapter 8, Defining storage classes, on page 83, Chapter 10, Defining aggregate groups, on page 139 and Chapter 10, Defining aggregate groups, on page 139. Define optical libraries and drives and tape libraries, if you have them. See z/os DFSMS OAM Planning, Installation, and Storage Administration Guide for Object Support and z/os DFSMS OAM Planning, Installation, and Storage Administration Guide for Tape Libraries. 4. Define ACS routines to assign the SMS classes and storage groups. Then test the routines. See Chapter 12, Defining ACS routines, on page 151. 5. Validate the ACS routines individually to check for errors. You should then validate the entire SMS configuration to check for errors that exist among its related parts. 6. Activate the valid SMS configuration. See Chapter 13, Activating Storage Management Subsystem configurations, on page 185. Running SMS in a parallel sysplex environment An SMS complex consists of systems or system groups that share a common configuration. A Parallel Sysplex is made up of systems that share a cross-system coupling facility (XCF); you can run multiple SMS complexes within a Parallel Sysplex. Restrictions: 1. An SMS complex should not span sysplexes. All of the volumes in the SMS complex should be in the same Parallel Sysplex. The cross-system sharing functions, such as VSAM record-level sharing (RLS), partitioned data set extended (PDSE) sharing, z/os Security Server RACF security and global shared resources (GRS) serialization, work only within the scope of a single Chapter 1. Introducing the Storage Management Subsystem 5